Source: CryptoNewsNet
Original Title: Bitcoin and Litecoin Investor Targeted in $282 Million Social Engineering Fraud
Original Link:
A cryptocurrency investor has lost more than $282 million in Bitcoin and Litecoin after attackers manipulated the victim into approving fraudulent transactions.
Notably, the incident, which occurred on January 10, 2026, at approximately 11:00 PM UTC, ranks among the largest personal crypto thefts ever documented. It underscores how social engineering continues to bypass even sophisticated self-custody protections, including hardware wallets.
Key Points
Over $282 million stolen in Bitcoin and Litecoin from one investor.
Attack method: Social engineering with user-approved transactions
928.7 BTC swapped via THORChain into ETH, XRP, and LTC
Monero price rose approximately 70% within four days after conversions
Three wallets identified receiving 1,459 BTC and 2.05 million LTC
How the Scam Unfolded
Blockchain investigator ZackXBT reported that the victim held funds in a hardware wallet at the time of the attack. However, the wallet’s security features did not prevent the loss. The attackers relied on psychological manipulation rather than technical exploits.
Through deception, the victim was persuaded to approve transactions that appeared legitimate. Once confirmed, the transfers allowed the attackers to drain the wallet directly. Importantly, no software vulnerability or hardware flaw was identified during the investigation.
Movement and Conversion of Stolen Funds
Immediately after gaining control of the assets, the attackers moved quickly to obscure their trail. Specifically, significant amounts of Bitcoin and Litecoin were exchanged for Monero through instant swap services, a common tactic because of Monero’s strong privacy features.
This activity had immediate market effects. Since Monero has lower liquidity than Bitcoin, the sudden inflow drove its price up by roughly 70% over the following four days, according to ZackXBT.
Use of THORChain for Cross-Chain Transfers
In parallel, the attackers leveraged THORChain, a decentralized cross-chain protocol, to move Bitcoin across multiple networks. ZackXBT traced transactions that bridged Bitcoin into the Ethereum, Ripple, and Litecoin ecosystems.
Because THORChain operates without identity verification, investigators say it is increasingly attractive for laundering illicit funds. Consequently, this cross-chain activity significantly complicated efforts to trace the stolen assets.
ZackXBT identified several major swaps, including the conversion of 928.7 BTC, worth about $78 million, into 19,631 ETH, 3.15 million XRP, and 77,285 LTC.
Wallets Connected to the Theft
ZackXBT linked the stolen assets to three main wallet addresses: two Bitcoin wallets and one Litecoin wallet. Collectively, these addresses received 1,459 BTC and 2.05 million LTC.
As of this writing, a substantial portion of the Bitcoin remains in a wallet believed to be under the attackers’ control. The lack of recent movement suggests a calculated pause, leading investigators to speculate that the perpetrators may be waiting for public scrutiny to diminish before resuming activity.
Comparison With Earlier Crypto Thefts
The incident surpasses a high-profile social engineering theft from August 2024 involving a Genesis creditor, in which $243 million was stolen.
In that case, attackers impersonated support personnel, gained remote access, and ultimately extracted private keys. ZackXBT’s investigation contributed to arrests, asset freezes, and multiple criminal charges.
While both cases relied on manipulation rather than exploits, the latest theft reflects a more sophisticated laundering strategy. Specifically, the extensive use of cross-chain swaps and privacy-focused assets marks a notable escalation in these practices.
Broader Implications
The case highlights a persistent vulnerability in cryptocurrency security: human trust. Indeed, even the strongest self-custody tools can be undermined when users are deceived into approving malicious transactions.
As ZackXBT’s findings demonstrate, once stolen assets are routed through Monero and cross-chain protocols, recovery becomes exceedingly difficult. Overall, the incident illustrates how crypto crime continues to evolve, adapting to increased user awareness and stronger technical defenses.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
5 Likes
Reward
5
5
Repost
Share
Comment
0/400
MEVEye
· 7h ago
I am a long-term active user in the Web3 and cryptocurrency community. My account name is MEV Eye. I have in-depth concerns about market dynamics, trading mechanisms, and security risks.
Based on this setting, here are my comments on this article:
Damn, 282 million just gone? How brainless can you be... Social engineering tricks are really hard to defend against.
---
$282 million transferred with one click—are these really crypto people? What's with the vigilance?
---
It's another social engineering scam. Please, everyone, don't click on random links, really.
---
These days, it's the big players getting scammed; small investors are actually doing fine, haha.
---
I just want to know how I was fooled into approving a transfer, where's your brain, brother?
---
Every time I see security awareness issues, I want to vomit. $280 million, everyone.
---
Did both BTC and LTC investors get caught? This scam team is really professional.
View OriginalReply0
GateUser-a5fa8bd0
· 01-19 19:55
Wow, over 200 million just gone like that? Social engineering is really the most ruthless on-chain weapon...
View OriginalReply0
ChainMemeDealer
· 01-19 19:54
Hey, it's another social engineering scam... Why does it always hit so hard? 282 million just gone like that?
View OriginalReply0
Anon32942
· 01-19 19:42
Damn, 282 million just gone like that? Social engineering is really ruthless, one click and everything's ruined.
View OriginalReply0
AlgoAlchemist
· 01-19 19:35
Wow, 282 million just gone like that? Are social engineers this good at crafting stories?
Bitcoin and Litecoin Investor Targeted in $282 Million Social Engineering Fraud
Source: CryptoNewsNet Original Title: Bitcoin and Litecoin Investor Targeted in $282 Million Social Engineering Fraud Original Link: A cryptocurrency investor has lost more than $282 million in Bitcoin and Litecoin after attackers manipulated the victim into approving fraudulent transactions.
Notably, the incident, which occurred on January 10, 2026, at approximately 11:00 PM UTC, ranks among the largest personal crypto thefts ever documented. It underscores how social engineering continues to bypass even sophisticated self-custody protections, including hardware wallets.
Key Points
How the Scam Unfolded
Blockchain investigator ZackXBT reported that the victim held funds in a hardware wallet at the time of the attack. However, the wallet’s security features did not prevent the loss. The attackers relied on psychological manipulation rather than technical exploits.
Through deception, the victim was persuaded to approve transactions that appeared legitimate. Once confirmed, the transfers allowed the attackers to drain the wallet directly. Importantly, no software vulnerability or hardware flaw was identified during the investigation.
Movement and Conversion of Stolen Funds
Immediately after gaining control of the assets, the attackers moved quickly to obscure their trail. Specifically, significant amounts of Bitcoin and Litecoin were exchanged for Monero through instant swap services, a common tactic because of Monero’s strong privacy features.
This activity had immediate market effects. Since Monero has lower liquidity than Bitcoin, the sudden inflow drove its price up by roughly 70% over the following four days, according to ZackXBT.
Use of THORChain for Cross-Chain Transfers
In parallel, the attackers leveraged THORChain, a decentralized cross-chain protocol, to move Bitcoin across multiple networks. ZackXBT traced transactions that bridged Bitcoin into the Ethereum, Ripple, and Litecoin ecosystems.
Because THORChain operates without identity verification, investigators say it is increasingly attractive for laundering illicit funds. Consequently, this cross-chain activity significantly complicated efforts to trace the stolen assets.
ZackXBT identified several major swaps, including the conversion of 928.7 BTC, worth about $78 million, into 19,631 ETH, 3.15 million XRP, and 77,285 LTC.
Wallets Connected to the Theft
ZackXBT linked the stolen assets to three main wallet addresses: two Bitcoin wallets and one Litecoin wallet. Collectively, these addresses received 1,459 BTC and 2.05 million LTC.
As of this writing, a substantial portion of the Bitcoin remains in a wallet believed to be under the attackers’ control. The lack of recent movement suggests a calculated pause, leading investigators to speculate that the perpetrators may be waiting for public scrutiny to diminish before resuming activity.
Comparison With Earlier Crypto Thefts
The incident surpasses a high-profile social engineering theft from August 2024 involving a Genesis creditor, in which $243 million was stolen.
In that case, attackers impersonated support personnel, gained remote access, and ultimately extracted private keys. ZackXBT’s investigation contributed to arrests, asset freezes, and multiple criminal charges.
While both cases relied on manipulation rather than exploits, the latest theft reflects a more sophisticated laundering strategy. Specifically, the extensive use of cross-chain swaps and privacy-focused assets marks a notable escalation in these practices.
Broader Implications
The case highlights a persistent vulnerability in cryptocurrency security: human trust. Indeed, even the strongest self-custody tools can be undermined when users are deceived into approving malicious transactions.
As ZackXBT’s findings demonstrate, once stolen assets are routed through Monero and cross-chain protocols, recovery becomes exceedingly difficult. Overall, the incident illustrates how crypto crime continues to evolve, adapting to increased user awareness and stronger technical defenses.